I don't see how. The keylogger logs every keystroke and therefore logs the access credentials to RDP to the server.
Regards, Hank Arnold Consumer Security "There are 10 kinds of people in the world... Those who understand binary and those who don't." My Blog: <http://it.toolbox.com/blogs/personal-pc-assistant/> http://it.toolbox.com/blogs/personal-pc-assistant/ Twitter: @Hank_PCDoc Facebook: <https://www.facebook.com/hank.arnold.96> https://www.facebook.com/hank.arnold.96 From: [email protected] [mailto:[email protected]] On Behalf Of J- P Sent: Monday, January 26, 2015 1:19 PM To: NT Subject: [NTSysADM] keylogger and RDP Hi all, If a pc is infected with a keylogger or some other malware, would that be able to compromise an RDP session made from the infected computer? Scenario 1; Infected pc goes online and logs into a bank account ( now everything is logged /compromised) Scenarios 2; Infected pc creates RDP session to uninfected server, goes online and logs into bank account Did scenario 2 help mitigate the compromise in anyway? TIA

